• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Guru: SIEM Is Only Part Of IBM i Cybersecurity

    March 28, 2022 Bruce Bading

    Many times, we hear from IBM i business owners that their SIEM – that’s short for Security Information and Event Management – is their cybersecurity solution for the IBM i. But that can’t be true, and I want to explain why it is part of the security shield but certainly not all of it.

    Let’s start with SIEMs and how they fit into cybersecurity frameworks. SIEM is mentioned in the PCI appendix, but not once in the core of the 250+ PCI DSS requirements, likewise, the NIST Cybersecurity Framework lists event monitoring as one of the 100s (1/100s) of NIST …

    Read more
  • Thoroughly Modern: IBM i Security Is No Longer Set It And Forget It

    March 14, 2022 Amal Macdonald

    For most IBM i shops, who are busy creating and maintaining the applications that run the business and who are not just chronically understaffed but structurally understaffed, the smartest thing they can do when it comes to security is give up.

    You heard that right. They need to put their arms in the air and surrender, absolutely and completely.

    No, we don’t mean they need to open all of the ports on their server, turn off the firewall, and let the ransomware and malware in and let the hackers and phishers do whatever they will. What we do mean by …

    Read more
  • Strengthen IBM i Password Security With Multi-Factor Authentication

    March 15, 2021 Bill Hammond

    As stories of data breaches caused by exploited credentials continue to make headlines, basic password protection mechanisms are no longer good enough. Organizations require an additional layer of protection that is also easy to use and doesn’t impose an additional burden on administrators.

    IBM i systems contain the data that drives your business, including financial transaction information, healthcare records, and other personally identifiable information for customers, partners, and employees. Much of this data is subject to regulations such as SOX, PCI DSS, HIPAA, and GDPR. Therefore, any data breach can result in regulatory fines, lost revenue, remediation costs, legal fees, …

    Read more
  • Can You Build Data Integrity Without Securing IBM i Systems?

    January 27, 2021 Bill Hammond

    Nowadays, companies tend to have vast troves of data stored on their IT platforms. Many companies are struggling to use that data – including critical data on IBM i – that could, in theory, help to make better business decisions and run operations more smoothly and efficiently. But in reality, that data is frequently siloed, inaccurate, and unsecured – leading CEOs to be concerned about the integrity of the data upon which they are basing decisions. Businesses across the globe are screaming for data they can trust.

    The pace of digital transformation initiatives has rapidly accelerated in the past year, …

    Read more
  • Trinity Guard Unveils New Tools for Linux, Db2 for i

    November 18, 2020 Alex Woodie

    Trinity Guard is on the move. The Houston, Texas, based security software company, which is the spiritual successor to the PentaSafe products, is rolling out a full auditing solution for Linux. It’s also developing a Linux version of its security management tool, TGCentral, with an AIX version up next. Plus it’s months away from releasing an encryption solution for Db2 for i.

    2020 has not been easy for anyone, but it’s not stopping the folks at Trinity Guard from moving forward on its roadmap items. Near the top of that list is increased support for running on Linux, which has …

    Read more
  • Confidence in IBM i Security Is Dropping, Syncsort Says

    May 6, 2020 Alex Woodie

    IBM i shops were significantly less confident in their ability to prevent a security breach in 2019 than the previous two years, according to a new study by Syncsort. More than 40 percent of IBM i shops have suffered at least one security breach, according to the study, which also indicates that awareness of security regulations is growing, but not for the ones you might think.

    In 2019, 11 percent of respondents reported being somewhat or very unconfident in their ability to prevent a data breach at their organization, Syncsort concluded in its new study, which is titled “IBM i …

    Read more
  • Security Still the Top Concern as Privacy Regs Loom

    February 12, 2020 Alex Woodie

    For the fourth year in a row, security is the number one concern of the IBM i installed base, according to HelpSystems’ 2020 IBM i Marketplace Survey. IBM i shops are clearly concerned about the need to prevent unauthorized access to applications and data. But security’s first cousin, data privacy, also stands to gain more attention with the recent passage of data privacy laws, such as GDPR and CCPA.

    HelpSystems released the results of its latest marketplace survey last month, as it has done for the past six years. And just as it has for every year since 2017, security …

    Read more
  • HelpSystems Bolsters Data Loss Prevention with Clearswift Buy

    December 4, 2019 Alex Woodie

    HelpSystems completed the first acquisition of the Kate Bolseth era this week with the purchase of Clearswift, a UK-based provider of data loss prevention (DLP) solutions. The software will play nicely with HelpSystems’ existing managed file transfer (MFT) offerings for IBM i and other platforms, according to new CEO Bolseth, who indicates that more and bigger acquisitions are on the horizon.

    Clearswift develops what it calls adaptive DLP, or A-DLP, technology that can automatically stop sensitive data from leaving the digital bounds of a company. When installed on a network gateway, the software will analyze the content of the documents …

    Read more
  • Original Refocuses on IBM i Test Automation

    May 1, 2019 Alex Woodie

    Original Software never left the IBM i software market, though it might have seemed that way to some people. But thanks to a new website devoted to exploring issues, challenges, and solutions on the topic of IBM i test automation, the British software company is redoubling its efforts around the midrange platform.

    “We really never un-engaged with it, to be fair,” says Original Software COO George Wilson says of IBM i. “We’ve kind of widened the radar a bit. That was probably 15 years ago. We didn’t want to limit ourselves to the IBM midrange marketplace. What we’ve just done …

    Read more
  • Trinity Guard Gives Audit Tool A Friendly GUI

    June 25, 2018 Alex Woodie

    IT professionals who are tired of using 5250 greenscreens to manually conduct regulatory audits of their IBM i systems may be interested in a colorful piece of software from Trinity Guard. The company recently launched TGCentral, which is a unified HTML interface designed to simplify the configuration and execution of security and regulatory audits across multiple IBM i servers.

    As the spiritual and intellectual successor to PentaSafe, Trinity Guard understands how beloved those old PentaSafe products were. Even though NetIQ/Attachmate/Micro Focus has not added any new features to its IBM i security suite for over a decade, there were …

    Read more

Previous Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle